An exploitable heap out-of-bounds read vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. An attacker needs to send an HTTPS request to trigger this vulnerability.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQZZPI34LAS3SFNW6Z2ZJ46RKVGEODNA/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2NK6FT7AMW5UIZNXDNHKEAYWAUMGSF/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUVZRXW5ZIGWVKOLF3NPXRPP74YX7BUY/ | vendor advisory |
https://www.debian.org/security/2020/dsa-4711 | third party advisory vendor advisory |
https://usn.ubuntu.com/4415-1/ | third party advisory vendor advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984 | third party advisory exploit |